edge adaptive image steganography based on lsb matching revisited
#1
Question 

hi,this is kavitha im doing a project on edge adaptive image steganography based on lsb matching revisited,im having abstract and requirements ,i need source code for my project
ABSTRACT :

The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis and extensive experiments, especially for those images with many smooth regions.[/u][/color]
In this paper, we expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and he difference between two consecutive pixels in the cover image. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. The experimental results evaluated on 6000 natural images with three specific and four universal steganalytic algorithms show that the new scheme can enhance the security significantly compared with typical LSB-based approaches as well as their edge adaptive ones, such as pixel-value-differencing-based approaches, while preserving higher visual quality of stage images at the same time.

Introduction

STEGANOGRAPHY is a technique for information hiding. It aims to embed secret data into a digital cover media, suchvas digital audio, image, video, etc., without being suspicious. steganalysis aims to expose the presence of hidden secret messages in those stego media.

the common approaches used to detect LSB replacement are totally ineffective at detecting the LSBM. 
Existing System:

Steganalytic algorithms, such as the RS analysis LSB replacement is a well-known steganographic method. In this embedding scheme, only the LSB plane of the cover image is overwritten with the secret bit stream according to a pseudorandom number generator (PRNG)

In this section, we first give a brief overview of the typical LSB-based approaches including LSB replacement, LSBM, and LSBMR, and some adaptive schemes including the original PVD scheme, the improved version of PVD (IPVD), adaptive edges with LSB (AE-LSB), and hiding behind corners (HBC) , and then show some image examples to expose the limitations of these existing schemes. Finally we propose some strategies to overcome these limitations.
Proposed system:

The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain.

LSB matching (LSBM) employs a minor modification to LSB replacement. If the secret bit does not match the LSB of the cover image, then or is randomly added to the corresponding
pixel value. Statistically, the probability of increasing or decreasing for each modified pixel value is the same and so the obvious asymmetry artifacts introduced by LSB replacement
can be easily avoided
architecture :


In the LSB replacement and LSBM approaches, the embedding process is very similar. Given a secret bit stream to be embedded, a traveling order in the cover image is first generated by a PRNG, and then each pixel along the traveling order is dealt with separately. For LSB replacement, the secret bit simply overwrites the LSB of the pixel, i.e., the first bit plane, while the higher bit planes are preserved. For the LSBM scheme, if the secret bit is not equal to the LSB of the given pixel, then 1 is added randomly to the pixel while keeping the altered pixel in the range of . In such a way, the LSB of pixels along the traveling order will match the secret bit stream after data hiding both for LSB replacement and LSBM. 
System Configuration
Hardware requirements :
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 MB.
Software requirements:
• Operating system : Windows XP Professional.
• Coding Language : Java

Reply
#2
to get information about the topic Steganography In Images full report,ppt and related topic refer the page link bellow

http://studentbank.in/report-steganograp...ars-report

http://studentbank.in/report-steganograp...ort?page=3

http://studentbank.in/report-steganograp...ort?page=2

http://studentbank.in/report-visual-cryp...-in-images

http://studentbank.in/report-steganography-full-report

http://studentbank.in/report-image-steganography

http://studentbank.in/report-steganography-in-images

http://studentbank.in/report-an-overview...ganography

http://studentbank.in/report-steganography--10609

http://studentbank.in/report-edge-adapti...-revisited

http://studentbank.in/report-a-novel-tec...n-encoding

http://studentbank.in/report-image-stega...-transform
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: adaptive pixel pair matching explanation, lsb based steganography source code, new approach in steganography by integrating different lsb algorithms and applying ra, efficient adaptive image steganography based on lsbmr algoithm, wat is the asumptions or constraints for edge adaptive image steganography based on lsb matchng, lsb matching revisited, random lsb steganography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Sad OCR for image files tawfiq1200 0 1,026 21-09-2014, 10:35 PM
Last Post: tawfiq1200
  edge adptive image steganography based on lsb matching revisited 1 1,148 29-11-2012, 01:57 PM
Last Post: seminar details
Wink edge technology sneha saraswati 3 2,080 12-10-2012, 12:29 PM
Last Post: seminar details
Thumbs Up source code for image restoration,reconstruction and enchancement srividyajv20 1 3,829 20-05-2012, 04:44 PM
Last Post: Guest
  advantages of edge detection 1 947 07-03-2012, 09:16 AM
Last Post: seminar paper
  landmine detection using wireless robot conttroled using image processing shyam langote 1 1,716 06-03-2012, 08:12 PM
Last Post: Guest
  adaptive photonic based phase locked elements technology ppt & documentation 0 1,101 04-03-2012, 03:15 PM
Last Post: Guest
  DISTORTION MINIMIZATION AND SECURED STEGANOGRAPHY USING CRYPTOGRAPHY KAVITHA MANIAN 0 861 26-02-2012, 07:17 PM
Last Post: KAVITHA MANIAN
Wink ppt on Supporting Pattern Matching Queries over Trajectories on Road Networks 0 887 18-02-2012, 09:05 PM
Last Post: Guest
Smile image processing shriramngn 1 1,128 10-02-2012, 10:40 AM
Last Post: seminar addict

Forum Jump: